This technical note proposes an algorithm to assess the safety of the cyber-physical system (CPS) in the presence of cyber attacks, which can be designed intelligently to avoid the detection. The ...main idea is based on the reachability analysis that computes the reachable set of CPS states possibly reached by all potential cyber attacks regardless of their detection. The reachable set computation typically demands a large computation cost and has mostly relied on the (over) approximation techniques. However, our algorithm analytically derives the exact reachable set solution and further establishes a recursive computation structure that can perform in the real-time CPS operation. This can significantly enhance the quality of the online safety assessment, enabling more reliable, less conservative, and computationally efficient process.
Modern cyber physical systems (CPSs) has widely being used in our daily lives because of development of information and communication technologies (ICT). With the provision of CPSs, the security and ...privacy threats associated to these systems are also increasing. Passive attacks are being used by intruders to get access to private information of CPSs. In order to make CPSs data more secure, certain privacy preservation strategies such as encryption, and k-anonymity have been presented in the past. However, with the advances in CPSs architecture, these techniques also need certain modifications. Meanwhile, differential privacy emerged as an efficient technique to protect CPSs data privacy. In this paper, we present a comprehensive survey of differential privacy techniques for CPSs. In particular, we survey the application and implementation of differential privacy in four major applications of CPSs named as energy systems, transportation systems, healthcare and medical systems, and industrial Internet of things (IIoT). Furthermore, we present open issues, challenges, and future research direction for differential privacy techniques for CPSs. This survey can serve as basis for the development of modern differential privacy techniques to address various problems and data privacy scenarios of CPSs.
To provide fine-grained access to different dimensions of the physical world, the data uploading in smart cyber-physical systems suffers novel challenges on both energy conservation and privacy ...preservation. It is always critical for participants to consume as little energy as possible for data uploading. However, simply pursuing energy efficiency may lead to extreme disclosure of private information, especially when the uploaded contents from participants are more informative than ever. In this article, we propose a novel mechanism for data uploading in smart cyber-physical systems, which considers both energy conservation and privacy preservation. The mechanism preserves privacy by concealing abnormal behaviors of participants, while still achieves an energy-efficient scheme for data uploading by introducing an acceptable number of extra contents. To derive an optimal uploading scheme is proved to be NP-hard. Accordingly, we propose a heuristic algorithm and analyze its effectiveness. The evaluation results towards a real-world dataset demonstrate that the performance of the proposed algorithm is comparable with the optimal results.
In softwarized industrial networking, honeypot identification is very important for both the attacker and the defender. Existing honeypot identification relies on simple features of honeypot. There ...exist two challenges: The simple feature is easily simulated, which causes inaccurate results, whereas the advanced feature relies on high interactions, which lead to security risks. To cope with these challenges, in this article, we propose a secure fuzzy testing approach for honeypot identification inspired by vulnerability mining. It utilizes error handling to distinguish honeypots and real devices. Specifically, we adopt a novel identification architecture with two steps. First, a multiobject fuzzy testing is proposed. It adopts mutation rules and security rules to generate effective and secure probe packets. Then, these probe packets are used for scanning and identification. Experiments show that the fuzzy testing is effective and corresponding probe packet can acquire more features than other packets. These features are helpful for honeypot identification.
This paper addresses a finite-time sliding-mode control problem for a class of Markovian jump cyber-physical systems. It is assumed that the control input signals transmitted via a communication ...network are vulnerable to cyber-attacks, in which the adversaries may inject false data in a probabilistic way into the control signals. Meanwhile, there may exist randomly occurring uncertainties and peak-bounded external disturbances. A suitable sliding mode controller is designed such that state trajectories are driven onto the specified sliding surface during a given finite-time (possibly short) interval. By introducing a partitioning strategy, the stochastic finite-time boundedness over the reaching phase and the sliding motion phase is analyzed, respectively. A key feature is that a set of mode-dependent sufficiently small scalars are introduced into some coupled Lyapunov inequalities such that the feasible solutions are easily obtained for the stochastic finite-time boundedness of the closed-loop systems. Finally, the practical system about a single-link robot-arm model is given to illustrate the present method.
Cyber–physical systems (CPSs) are complex systems that involve technologies such as control, communication, and computing. Nowadays, CPSs have a wide range of applications in smart cities, smart ...grids, smart manufacturing and intelligent transportation. However, with integration of industrial control systems with modern communication technologies, CPSs would be inevitably exposed to increasing security threats, which could lead to severe degradation of the system performance and even destruction of CPSs. This paper presents a survey on recent advances on security issues of industrial cyber–physical systems (ICPSs). We specifically discuss two typical kinds of attacks, i.e., Denial-of-Service (DoS) attack and Deception attack, and present recent results in terms of attack detection, estimation, and control of ICPSs. Classifications of current studies are analyzed and summarized based on different system modeling and analysis methods. In addition, advantages and disadvantage of various methodologies are also discussed. Finally, the paper concludes with some potential future research directions on secure ICPSs.
•A more comprehensive survey on attack detection, secure estimation, and control of ICPSs from the control science perspective.•Classifications of current studies are analyzed and summarized based on different system modeling and analysis methods.•Advantages and disadvantage of various methodologies are discussed.
Industrial cyber-physical systems (CPSs) are large-scale, geographically dispersed, and life-critical systems, in which lots of sensors and actuators are embedded and networked together to facilitate ...real-time monitoring and closed-loop control. Their intrinsic features in geographic space and resources put forward to urgent requirements of reliability and scalability for designed filtering or control schemes. This paper presents a review of the state-of-the-art of distributed filtering and control of industrial CPSs described by differential dynamics models. Special attention is paid to sensor networks, manipulators, and power systems. For real-time monitoring, some typical Kalman-based distributed algorithms are summarized and their performances on calculation burden and communication burden, as well as scalability, are discussed in depth. Then, the characteristics of non-Kalman cases are further disclosed in light of constructed filter structures. Furthermore, the latest development is surveyed for distributed cooperative control of mobile manipulators and distributed model predictive control in industrial automation systems. By resorting to droop characteristics, representative distributed control strategies classified by controller structures are systematically summarized for power systems with the requirements of power sharing and voltage and frequency regulation. In addition, distributed security control of industrial CPSs is reviewed when cyber-attacks are taken into consideration. Finally, some challenges are raised to guide the future research.
As an effective distributed renewable energy utilization paradigm, a microgrid is expected to realize the high integration of the industrial cyber-physical systems (CPS), which has attracted ...extensive attention from academia and industry. However, the real-time interaction and feedback loop between physical systems and cyber systems have posed severe challenges to the reliability, determinacy, and energy efficiency of the multiway flow of information and communication transmission. In order to solve the problem of slot scheduling and data transmission (SSDT) in the microgrid, a novel real-time deterministic scheduling (RTDS) scheme for industrial CPS is proposed in this article. First, the SSDT is formulated as a multiway flow scheduling problem, and it is theoretically proved that the SSDT problem is NP-hard. Then, the RTDS scheme designs two heuristic algorithms: scheduling request preprocessing and greedy-based multichannel time slot allocation for an optimal scheduling solution. Practical experimental results demonstrate that the proposed RTDS scheme has significant advantages in packet loss rate, deadline guarantee rate, and energy consumption compared with the traditional schemes, and thus, is more suitable for deployment in microgrid systems.
Cyber-physical systems in manufacturing Monostori, L.; Kádár, B.; Bauernhansl, T. ...
CIRP annals,
2016, 2016-00-00, Letnik:
65, Številka:
2
Journal Article
Recenzirano
One of the most significant advances in the development of computer science, information and communication technologies is represented by the cyber-physical systems (CPS). They are systems of ...collaborating computational entities which are in intensive connection with the surrounding physical world and its on-going processes, providing and using, at the same time, data-accessing and data-processing services available on the Internet. Cyber-physical production systems (CPPS), relying on the latest, and the foreseeable further developments of computer science, information and communication technologies on one hand, and of manufacturing science and technology, on the other, may lead to the 4th industrial revolution, frequently noted as Industrie 4.0. The paper underlines that there are significant roots in general – and in particular to the CIRP community – which point towards CPPS. Expectations towards research in and implementation of CPS and CPPS are outlined and some case studies are introduced. Related new R&D challenges are highlighted.
With the increasing population of Industry 4.0, both AI and smart techniques have been applied and become hotly discussed topics in industrial cyber-physical systems (CPS). Intelligent anomaly ...detection for identifying cyber-physical attacks to guarantee the work efficiency and safety is still a challenging issue, especially when dealing with few labeled data for cyber-physical security protection. In this article, we propose a few-shot learning model with Siamese convolutional neural network (FSL-SCNN), to alleviate the over-fitting issue and enhance the accuracy for intelligent anomaly detection in industrial CPS. A Siamese CNN encoding network is constructed to measure distances of input samples based on their optimized feature representations. A robust cost function design including three specific losses is then proposed to enhance the efficiency of training process. An intelligent anomaly detection algorithm is developed finally. Experiment results based on a fully labeled public dataset and a few labeled dataset demonstrate that our proposed FSL-SCNN can significantly improve false alarm rate (FAR) and F1 scores when detecting intrusion signals for industrial CPS security protection.